ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-52959C3F4197
|
Infrastructure Scan
ADDRESS: 0xb76a520d4f56fce168514c0b494a9a3a640a734a
DEPLOYED: 2026-05-03 14:33:59
LAST_TX: 2026-05-03 15:19:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 9887. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x698fc69e). [MEM] Stack depth: 9 / 1024. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-74F0D3FB.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task EBD06085 finished in 80s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb876a03665e8b7d286e0cf4233270ab0d80cf2ad 0x9de9620c690b80abe7f110735fa3af9c6c887eef 0xa4e4235d35c13b91cd494c250e5b22a948963d67 0x72599a6106f86496a4650c622c689cebb6251b08 0x5ecffc6af842e665b95ec889cea064f66000cfc5 0xe17882f5d60419ac51b8038bd8dfda2a23ce7f0c 0xb5a58b293bb75eb5a00f7cb33ef5918af3cd624e 0x3c25433ffc5e40e60ec66cc1d33354fabdc7ad3f 0x8429b9ab73dad56759b07824692edefb922064f8 0x05f50a7b5acbf05bdf770eaf217e7c5b9d18fae8 0xf011b8d2fbc542f149e51c3728284ec6b550418b 0x32eed6981b2d451ae8176fdbf8d832e7967ddd3d 0x4e4d10979df587d9f4fb2efd2ecb35cb89d123a3 0x8f755acd6427125b0cbaae7ff601dc5885155694 0x67572f5841f9a0b8a13cf519fe01e39a5b3a29e7 0x6ac7afa5bebec6cbf27fc9ebb8cf1681550db6ee 0x3d4dfb8e372b57383c6f7867121c5ad915889a01 0xa874bc94521853207cd6b9808f92384656261999 0x413a5e58e0aec7b26840aeb44a6b6d2de38e5a24 0x5b7815c3c8a6f25d62e7638e3eb4c0ba74fbb07b